Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 21:55
Behavioral task
behavioral1
Sample
manycam1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
manycam1.exe
Resource
win10v2004-20240508-en
General
-
Target
manycam1.exe
-
Size
33KB
-
MD5
410f4badf0faec4a98c5f03935f81b2f
-
SHA1
f68cadc5ae367272146b975033a195dd3c956a77
-
SHA256
9018301334a6982207be515d59738a66abab7080cd5d12d673052d39137460b6
-
SHA512
df12bd83f11bc5a5b0c8c44ec041d55af23bc71822b8a5e879e356f62a2bc4b1a414ffd38bd4d8b887d6ba65a7cba2ef96c54368bd2e0618205f6ee4466ea188
-
SSDEEP
768:WMuijtHf5g7/IIG3bGcYDBSvFIWuePQtv66l/tzS7IPlo:DNW71rcYDAWeotvXlFWWl
Malware Config
Extracted
xtremerat
sexylegs.ddns.net
Signatures
-
Detect XtremeRAT payload 4 IoCs
resource yara_rule behavioral2/memory/4072-1-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4072-3-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2808-4-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2808-13-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{3XT5288U-GGDS-14RE-62Q7-0801G0FKV3K1} manycam1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3XT5288U-GGDS-14RE-62Q7-0801G0FKV3K1}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" manycam1.exe -
resource yara_rule behavioral2/memory/2808-0-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4072-1-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4072-3-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2808-4-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2808-13-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" manycam1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" manycam1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe manycam1.exe File created C:\Windows\InstallDir\Server.exe manycam1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2344 4072 WerFault.exe 82 4392 4072 WerFault.exe 82 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 manycam1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4072 2808 manycam1.exe 82 PID 2808 wrote to memory of 4072 2808 manycam1.exe 82 PID 2808 wrote to memory of 4072 2808 manycam1.exe 82 PID 2808 wrote to memory of 4072 2808 manycam1.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\manycam1.exe"C:\Users\Admin\AppData\Local\Temp\manycam1.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 4803⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 4763⤵
- Program crash
PID:4392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4072 -ip 40721⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4072 -ip 40721⤵PID:1912